- 2009
- Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams. J. Networks 4(7): 589-597 (2009) - Khaldoun Al Agha, Gérard Chalhoub, Alexandre Guitton, Erwan Livolant, Saoucene Mahfoudh, Pascale Minet, Michel Misson, Joseph Rahmé, Thierry Val, Adrien van den Bossche:
Cross-layering in an Industrial Wireless Sensor Network: Case Study of OCARI. J. Networks 4(6): 411-420 (2009) - Kishore Angrishi, Ulrich Killat:
On the Observance of Approximate Invariance of Effective Bandwidth with Finite Number of Sources. J. Networks 4(9): 805-818 (2009) - Nauman Aslam, William J. Phillips, William Robertson:
Effective Location Management of Mobile Actors in Wireless Sensor and Actor Networks. J. Networks 4(1): 1-8 (2009) - Salem Belhaj, Moncef Tagina:
Modeling and Prediction of the Internet End-to-end Delay using Recurrent Neural Networks. J. Networks 4(6): 528-535 (2009) - Romildo Martins da Silva Bezerra, Joberto Sérgio Barbosa Martins:
A Policy-Based Autonomic Model Suitable for Quality of Service Management. J. Networks 4(6): 495-504 (2009) - Saleem N. Bhatti, Martin Bateman:
Transport Protocol Throughput Fairness. J. Networks 4(9): 881-894 (2009) - Jun Bi, Guang Yao, Jianping Wu:
An IPv6 Source Address Validation Testbed and Prototype Implementation. J. Networks 4(2): 100-107 (2009) - Cai Biao, Zhishu Li:
Computing and Routing for Trust in Structured P2P Network. J. Networks 4(7): 667-674 (2009) - Noureddine Boudriga, Habtamu Abie:
Guest Editorial. J. Networks 4(7): 537-538 (2009) - Yuri Breitbart, Feodor F. Dragan, Hassan Gobjuka:
Effective Monitor Placement in Internet Networks. J. Networks 4(7): 657-666 (2009) - Jun Cai, Shun-Zheng Yu, Jing-li Liu:
The Design of a Wireless Data Acquisition and Transmission System. J. Networks 4(10): 1042-1049 (2009) - Tianjie Cao, Tao Quan, Bo Zhang:
Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols. J. Networks 4(4): 263-270 (2009) - Yogesh Chaba, Yudhvir Singh, Preeti Aneja:
Performance Analysis of Disable IP Broadcast Technique for Prevention of Flooding-Based DDoS Attack in MANET. J. Networks 4(3): 178-183 (2009) - Ling Chen, Hai-Ying Sun, Su Wang:
First Order Deceptive Problem of ACO and Its Performance Analysis. J. Networks 4(10): 993-1000 (2009) - Ling-Feng Chiang, Jiang-Whai Dai:
A New Method to Detect Abnormal IP Address on DHCP. J. Networks 4(6): 458-464 (2009) - Paolo Cremonesi, Roberto Turrin, Vassil N. Alexandrov:
Modeling the Effects of Node Heterogeneity on the Performance of Grid Applications. J. Networks 4(9): 837-854 (2009) - Hui Cui, Tianjie Cao:
An Novel Anonymous Authenticated and Key Exchange Protocol. J. Networks 4(10): 985-992 (2009) - Giuseppe D'Acquisto, Pietro Cassarà, Luigi Alcuri:
An Innovative Pricing Method for Telecommunication Services Pricing through American Options. J. Networks 4(1): 65-74 (2009) - Weihui Dai, Shuyi Liang, Wei Yan:
Research on Real-Time Mobile 3D Topography System. J. Networks 4(5): 307-314 (2009) - Xunxing Diao, Messaoud Kara, Jian-Jin Li, Kun Mean Hou, Haiying Zhou, Aurélien Jacquot:
Cooperative Inter-vehicle Communication Protocol With Low Cost Differential GPS. J. Networks 4(6): 445-457 (2009) - Péter Ekler, Imre Kelényi, István Dévai, Balázs Bakos, Attila Kiss:
Hybrid Peer-to-Peer Content Sharing in Mobile Networks. J. Networks 4(2): 119-132 (2009) - Xiu Fu, Qiuliang Xu, Hao Wang:
A Provably-Secure Password-Authenticated Group Key Agreement in the Standard Model. J. Networks 4(8): 763-770 (2009) - Md. Osman Gani, Hasan Sarwar, Chowdhury Mofizur Rahman:
Prediction of State of Wireless Network Using Markov and Hidden Markov Model. J. Networks 4(10): 976-984 (2009) - Kun Mean Hou:
Guest Editorial. J. Networks 4(6): 379-381 (2009) - Sheikh Mahbub Habib, Cyril Jacob, Tomas Olovsson:
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones. J. Networks 4(10): 968-975 (2009) - Ruo-Fei Han, Hou-Xiang Wang, Qian Xiao, Xiao-Pei Jing, Hui Li:
A United Access Control Model for Systems in Collaborative Commerce. J. Networks 4(4): 279-289 (2009) - Xin He, Xiaolin Gui:
The Localized Area Coverage algorithm Based on Game-Theory for WSN. J. Networks 4(10): 1001-1008 (2009) - Yong-Zhong He, Zhen Han:
User Authentication with Provable Security against Online Dictionary Attacks. J. Networks 4(3): 200-207 (2009) - Ping He, Zengtang Qu:
Comparison Computing Based on Sub-optimum Analysis: A Guide System of Network Security. J. Networks 4(8): 779-786 (2009)